<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HTTPS Decryption in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Decryption/m-p/47931#M9353</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am looking to see if anyone has any suggestions/ideas on best ways for HTTPS web traffic etc.&lt;/P&gt;&lt;P&gt;At present I have a Cisco Proxy Appliance used for web traffic (on the inside of the Firewall) and I decrypt web traffic here.&amp;nbsp; The Cisco Proxy Appliance can then allow/block the relevant traffic.&lt;/P&gt;&lt;P&gt;From the Check Point, I want to use this in a basic form to do additional blocking that the Cisco Proxy Appliance is unable to do ie block Dropbox/One Drive, Yahoo Messenger, etc) but at present this is not working fully as I don't have HTTPS Inspection enabled.&lt;/P&gt;&lt;P&gt;I am looking for any suggestions/ideas if anyone else has the same type of setup?&lt;/P&gt;&lt;P&gt;Ways I could do this at the moment would be:&lt;/P&gt;&lt;P&gt;1 - decrypt Cisco Proxy Appliance traffic and leave Firewall as is (Cisco could identify all traffic but Firewall wouldn't)&lt;/P&gt;&lt;P&gt;2 - no decrypt on Cisco Proxy Appliance and decrypt all traffic at Firewall&amp;nbsp;(Cisco couldn't identify all traffic but Firewall could)&lt;/P&gt;&lt;P&gt;3 - decrypt Cisco Proxy Appliance traffic and decrypt Firewall traffic&amp;nbsp;(Cisco and Firewall could&amp;nbsp;identify all traffic however this may have performance impact)&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Wed, 20 Mar 2019 11:20:47 GMT</pubDate>
    <dc:creator>NeilDavey</dc:creator>
    <dc:date>2019-03-20T11:20:47Z</dc:date>
    <item>
      <title>HTTPS Decryption</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Decryption/m-p/47931#M9353</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am looking to see if anyone has any suggestions/ideas on best ways for HTTPS web traffic etc.&lt;/P&gt;&lt;P&gt;At present I have a Cisco Proxy Appliance used for web traffic (on the inside of the Firewall) and I decrypt web traffic here.&amp;nbsp; The Cisco Proxy Appliance can then allow/block the relevant traffic.&lt;/P&gt;&lt;P&gt;From the Check Point, I want to use this in a basic form to do additional blocking that the Cisco Proxy Appliance is unable to do ie block Dropbox/One Drive, Yahoo Messenger, etc) but at present this is not working fully as I don't have HTTPS Inspection enabled.&lt;/P&gt;&lt;P&gt;I am looking for any suggestions/ideas if anyone else has the same type of setup?&lt;/P&gt;&lt;P&gt;Ways I could do this at the moment would be:&lt;/P&gt;&lt;P&gt;1 - decrypt Cisco Proxy Appliance traffic and leave Firewall as is (Cisco could identify all traffic but Firewall wouldn't)&lt;/P&gt;&lt;P&gt;2 - no decrypt on Cisco Proxy Appliance and decrypt all traffic at Firewall&amp;nbsp;(Cisco couldn't identify all traffic but Firewall could)&lt;/P&gt;&lt;P&gt;3 - decrypt Cisco Proxy Appliance traffic and decrypt Firewall traffic&amp;nbsp;(Cisco and Firewall could&amp;nbsp;identify all traffic however this may have performance impact)&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 11:20:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Decryption/m-p/47931#M9353</guid>
      <dc:creator>NeilDavey</dc:creator>
      <dc:date>2019-03-20T11:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Decryption</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Decryption/m-p/48164#M9400</link>
      <description>Why are you maintaining two seperate security solutions?</description>
      <pubDate>Thu, 21 Mar 2019 18:28:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Decryption/m-p/48164#M9400</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-21T18:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Decryption</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Decryption/m-p/48173#M9402</link>
      <description>&lt;P&gt;I do not think that pairing your Cisco appliance with Check Point gateway is the optimal solution.&lt;/P&gt;
&lt;P&gt;I'd have all traffic decrypted analyzed and blocked or allowed by Check Point.&lt;/P&gt;
&lt;P&gt;"One to many" dedicated SSL decryptors/re-encryptors are a different story, but we are talking about IXIA, Gigamon, F5 or Symantec SSL in these cases.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 20:48:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Decryption/m-p/48173#M9402</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-21T20:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Decryption</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Decryption/m-p/48369#M9444</link>
      <description>The Cisco Proxy Appliance is our corporate standard product for Web Filtering and the reporting is also very detailed. I have in the past tried to use the Check Point URL/App Control for filtering but had issues where some sites would be allowed which I would not want and vice versa. I also am unsure why Check Point categorize websites as multiple categories (example, &lt;A href="http://www.playboy.com" target="_blank"&gt;www.playboy.com&lt;/A&gt; Categories: Sex, Nudity, Entertainment). This was causing issues in creating a base policy for users which didn't work for us.&lt;BR /&gt;&lt;BR /&gt;I was just seeing if anyone else had a main filtering product but also used the Check Point for more granular filtering.</description>
      <pubDate>Sat, 23 Mar 2019 09:20:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Decryption/m-p/48369#M9444</guid>
      <dc:creator>NeilDavey</dc:creator>
      <dc:date>2019-03-23T09:20:40Z</dc:date>
    </item>
  </channel>
</rss>

